Meet Ai3, the DTEX Risk Assistant. Fast-track effective insider risk management with guided investigations.

WORKFORCE CYBER
INTELLIGENCE AND SECURITY

BLOG

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

April 10, 2024 | Kellie Roessler

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of…

Read More
Zero Trust Meets Insider Risk Management

March 28, 2024 | Kellie Roessler

Zero Trust Meets Insider Risk Management

What do Jack Teixeira, Joshua Schulte, and Korbein Schultz have in common? All three worked for the federal government in…

Read More

April 10, 2024 | Kellie Roessler

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of…

Read More
DTEX i³ Threat Advisory Multiple Identities

March 12, 2024 | Kellie Roessler

DTEX i³ Issues Threat Advisory for Detecting the Use of Multiple Identities

The DTEX i3 team has issued a new Threat Advisory following recent investigations linking the use of multiple personal accounts…

Read More
DTEX i³ reveals vulnerabilities and mitigations associated with common workforce web applications

January 30, 2024 | Kellie Roessler

DTEX i³ Issues Threat Advisory for Mitigating Insider Abuse of Insecure Web Apps

Web applications offer powerful workforce efficiencies, but they are not without their risks. Misconfiguration of web applications can open the…

Read More
Understanding pseudonymization and anonymization

October 25, 2023 | Kellie Roessler

Pseudonymization vs. Anonymization

A common challenge organizations face is striking the balance between employee privacy and insider risk monitoring. Using pseudonymization, organizations can…

Read More
Pentagon ‘Critical Compromise’ Who is Keeping Score

August 17, 2023 | Kellie Roessler

Pentagon Compromise | The Most Effective Insider Threat Sensors Are People

DTEX i3 team confirms people are the most effective insider threat sensors; identifies several other early warning indicators. It’s been four…

Read More
Cyberbytes: The Insider Threat and The Real Risk to Enterprises

July 18, 2023 | Armaan Mahbod

CyberBytes Recap: The Insider Threat and the Real Risk to Enterprises

I recently sat down with CyberBytes podcast host and co-founder of Aspiron Search Joseph Cooper to discuss the insider…

Read More
INSIDER RISK LEGISLATION IS COMING ARE YOU PREPARED

June 13, 2023 | Kellie Roessler

Insider Risk Legislation is Coming: Are You Prepared?

The rise of foreign interference and high-profile breaches has highlighted the need to address the human element in cybersecurity through…

Read More
INSIDER RISK DETECTION 101: MITIGATING UNINTENTIONAL INSIDER THREATS

January 23, 2023 | Armaan Mahbod

Massive Tech Layoffs Continue to Increase Insider Risks for Enterprises

The looming recession is driving big tech companies to reduce their workforce in 2023, with Microsoft being the latest to…

Read More
The gig is up! And that’s not all good.

January 18, 2023 | Rajan Koo

The Gig is Up! And that's Not All Good

This is the time of year when everyone is looking for little extra cash to pay off a few holiday…

Read More
Insider Threats in a Stable Economy image

December 15, 2022 | Rajan Koo

Insider Threats in an Unstable Economy: DTEX i3 Team Data

This year has been a turbulent one for employers and employees alike. We rang in 2022 amid The Great Resignation—a…

Read More
Disgruntled employees layoffs insider risk management blog post

September 20, 2022 | Rajan Koo

Moving from Insider Risk to Insider Threat: Disgruntled Employees and Looming Layoffs

There’s been a lot of misconception about the quiet quitting movement since Zaid Khan, a 24-year-old engineer from New York, …

Read More
cybersecurity tips for online shopping mother's day blog post

May 6, 2022 | Armaan Mahbod

Protect Your Data: Cyber Security Tips for Online Shopping This Mother’s Day

In this blog, we frequently focus on how organizations can protect against malicious insider threats. However, we haven’t forgotten about…

Read More